General

  • Target

    b2e4ade36630708f86783ebbba13165d.bin

  • Size

    4.2MB

  • Sample

    250507-b1n2ssek3t

  • MD5

    3d36c6d475a683a7de520f00143d37bb

  • SHA1

    08cebea96339b50f7cdb2c22972bf1cc1a9c0513

  • SHA256

    bb66e92ff2c1c660f6c2e50063d4566285dd6ffe5ff184d910cb8f266241dfba

  • SHA512

    0f343fb7061455d8b5138920a80726ee06f21870440241712bfae62985c3121b2db0aade94de6bfb244e15df1d7051dfbc360ab4268f958b26158ad48d43fe2d

  • SSDEEP

    98304:CMZhXfG/yVEf8L4gTaGgjFitroLaG8+MngMSTq6Xfp7:CiXuqVEf8UgTpgjld8zgtV

Malware Config

Extracted

Family

gcleaner

C2

45.91.200.135

Targets

    • Target

      fad90b975af603df711f6533415835b1362b476c1f214530d620aace0532c36c.exe

    • Size

      4.2MB

    • MD5

      b2e4ade36630708f86783ebbba13165d

    • SHA1

      4c502786fa2e8d7761ce200141a882740a2de9b6

    • SHA256

      fad90b975af603df711f6533415835b1362b476c1f214530d620aace0532c36c

    • SHA512

      9ff6c0932d8088800cdce11bd40dd96660b26ebec84e76f61140391b1f0e015c76aedd9c3cb2d511d2f7ac08bc2ce2a923898f082ad90615715446b3af769821

    • SSDEEP

      98304:Gl7uFNSdIBKg2QbaM+82ExdPpQtOd8NkToTfZhuqPo6g4:AuNdMg2QeMGq5AOukIfFPo

    • GCleaner

      GCleaner is a Pay-Per-Install malware loader first discovered in early 2019.

    • Gcleaner family

    • Identifies VirtualBox via ACPI registry values (likely anti-VM)

    • Downloads MZ/PE file

    • Checks BIOS information in registry

      BIOS information is often read in order to detect sandboxing environments.

    • Executes dropped EXE

    • Identifies Wine through registry keys

      Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.

    • Suspicious use of NtSetInformationThreadHideFromDebugger

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v16

Tasks

OSZAR »